Mixed Strand Spaces

نویسندگان

  • F. Javier Thayer
  • Jonathan C. Herzog
  • Joshua D. Guttman
چکیده

Strand space analysis [13, 12] is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related problem of mixed protocols, and show that a protocol can remain correct even when used in combination with a range of other protocols. We illustrate the method with the familiar OtwayRees [10, 1] protocol. We identify a simple and easily verified characteristic of protocols, and show that the OtwayRees protocol remains correct even when used in combination with other protocols that have this characteristic. We also illustrate this method on the NeumanStubblebine protocol [9]. This protocol has two parts, an authentication protocol (I) in which a key distribution center creates and distributes a Kerberos-like key, and a reauthentication protocol (II) in which a client resubmits a ticket containing that key. The re-authentication protocol II is known to be flawed [2]. We show that in the presence of protocol II, there are also attacks against protocol I. We then define a variant of protocol II, and prove an authentication property of I that holds even in combination with the modified II.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Composing Strand Spaces

The strand space model for the analysis of security protocols is known to have some limitations in the patterns of nondeterminism it allows and in the ways in which strand spaces can be composed. Its successful application to a broad range of security protocols may therefore seem surprising. This paper gives a formal explanation of the wide applicability of strand spaces. We start with an exten...

متن کامل

Approximate mixed additive and quadratic functional in 2-Banach spaces

In the paper we establish the general solution of the function equation f(2x+y)+f(2x-y) = f(x+y)+f(x-y)+2f(2x)-2f(x) and investigate the Hyers-Ulam-Rassias stability of this equation in 2-Banach spaces.

متن کامل

A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis

Formal analysis of security protocols is largely based on a set of assumptions commonly referred to asthe Dolev-Yao model. Two formalisms that state the basic assumptions of this model are related here:strand spaces and multiset rewriting with existential quantification. Strand spaces provide a simple andeconomical approach to analysis of completed protocol runs by emphasizing causa...

متن کامل

Analysing TLS Using the Strand Spaces Model

In this paper, we analyse the Transport Layer Security (TLS) protocol within the strand spaces setting. In [BL03] Broadfoot and Lowe suggested an abstraction of TLS. The abstraction models the security services that appear to be provided by the protocol to the high-level security layers. The outcome of our analysis provides a formalisation of the security services provided by TLS and proves tha...

متن کامل

Approximating fixed points for nonexpansive mappings and generalized mixed equilibrium problems in Banach spaces

We introduce a new iterative scheme for nding a common elementof the solutions set of a generalized mixed equilibrium problem and the xedpoints set of an innitely countable family of nonexpansive mappings in a Banachspace setting. Strong convergence theorems of the proposed iterative scheme arealso established by the generalized projection method. Our results generalize thecorresponding results...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999